Movatterモバイル変換


[0]ホーム

URL:


US9892396B2 - Multi-point authentication for payment transactions - Google Patents

Multi-point authentication for payment transactions
Download PDF

Info

Publication number
US9892396B2
US9892396B2US14/662,323US201514662323AUS9892396B2US 9892396 B2US9892396 B2US 9892396B2US 201514662323 AUS201514662323 AUS 201514662323AUS 9892396 B2US9892396 B2US 9892396B2
Authority
US
United States
Prior art keywords
payment
mobile device
pos terminal
randomized
cardholder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/662,323
Other versions
US20160275508A1 (en
Inventor
Timothy C. Buchholtz
Morgan D. Davis
Daniel Ramirez
Michael J. Rohn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Airbnb Inc
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ROHN, MICHAEL J., BUCHHOLTZ, TIMOTHY C., DAVIS, MORGAN D., RAMIREZ, DANIEL
Priority to US14/662,323priorityCriticalpatent/US9892396B2/en
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US14/669,626prioritypatent/US10055723B2/en
Priority to PCT/CN2016/076594prioritypatent/WO2016146071A1/en
Publication of US20160275508A1publicationCriticalpatent/US20160275508A1/en
Priority to US15/858,054prioritypatent/US11017370B2/en
Application grantedgrantedCritical
Publication of US9892396B2publicationCriticalpatent/US9892396B2/en
Priority to US16/288,808prioritypatent/US11017371B2/en
Assigned to Airbnb, Inc.reassignmentAirbnb, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Authentication includes receiving an indication of physical possession of a payment card by a merchant and receiving a purchase request for an authorization of an exchange from the payment account of the cardholder to the merchant. Authentication includes assigning a randomized transaction identifier to the request for the authorization of the exchange. The method also includes transmitting the request for the authorization of the exchange from the payment account of the cardholder to the merchant and receiving the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange is valid. Authentication includes transmitting a copy of the randomized authentication identifier to the mobile device and receiving validation that the transmitted copy of the randomized authentication identifier from the mobile device matches the randomized authentication identifier.

Description

BACKGROUND
The present disclosure relates to payment authentication, and, more specifically, to multi-point authentication for payment transactions.
Payment cards, such as debit and credit cards, have become nearly ubiquitous ways of paying for purchases. By using a payment card tied to a credit or debit account, as opposed to cash, certain security risks may arise. As financial and privacy breaches have spread, security in transactions has become increasingly important. As a result, it can be beneficial to increase security in many aspects of the usage of payment cards and associated transactions.
SUMMARY
Embodiments of the present disclosure provide for a method, system, and computer program product for multi-point authentication for payment transactions.
One embodiment is directed toward a method for multi-point authentication for payment transactions. The method includes receiving, by a point-of-sale (POS) terminal, a first indication that a payment account of a cardholder is associated with a mobile device of the cardholder. The method also includes receiving, by the POS terminal, a second indication of physical possession of a payment card by a merchant. The method also includes receiving, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant. The method also includes assigning, by the POS terminal, a randomized transaction identifier to the request for the authorization of the exchange of funds. The method also includes transmitting, by the POS terminal, the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant. The method also includes receiving, by the POS terminal, the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid. The method also includes transmitting, by the POS terminal, a copy of the randomized authentication identifier to the mobile device. The method also includes receiving, by the POS terminal, validation that the transmitted copy of the randomized authentication identifier from the mobile device matches the randomized authentication identifier.
Another embodiment is directed toward a system for use with a host payment association server that is configured to validate transactions of a payment account and communicate with a linked mobile device that is configured to validate payment transactions. The system includes one or more computer processor circuits that are configured to host a transaction validation application. The transaction validation application is configured to receive, by a point-of-sale (POS) terminal, a first indication that a payment account of a cardholder is associated with a mobile device of the cardholder. The transaction validation application is also configured to receive, by the POS terminal, a second indication of physical possession of a payment card by a merchant. The transaction validation application is also configured to receive, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant. The transaction validation application is also configured to assign, by the POS terminal, a randomized transaction identifier to the request for the authorization of the exchange of funds. The transaction validation application is also configured to transmit, by the POS terminal, the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant. The transaction validation application is also configured to receive, by the POS terminal, the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid. The transaction validation application is also configured to transmit, by the POS terminal, a copy of the randomized authentication identifier to the mobile device. The transaction validation application is also configured to receive, by the POS terminal, validation that the transmitted copy of the randomized authentication identifier from the mobile device matches the randomized authentication identifier.
Another embodiment is directed toward a computer program product for managing a community merge operation.
The above summary is not intended to describe each illustrated embodiment or every implementation of the present disclosure.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
The drawings included in the present application are incorporated into, and form part of, the specification. They illustrate embodiments of the present disclosure and, along with the description, serve to explain the principles of the disclosure. The drawings are only illustrative of certain embodiments and do not limit the disclosure.
FIG. 1 depicts a system for push payment authentication, according to various embodiments.
FIG. 2 depicts a system for pull payment authentication, according to various embodiments.
FIG. 3 depicts a system for payment authentication, according to various embodiments.
FIG. 4 depicts a flowchart of a method for payment authentication, according to various embodiments.
FIG. 5 depicts a flowchart of a method for payment authentication, according to various embodiments.
FIG. 6 depicts a flowchart of a method for payment authentication, according to various embodiments.
FIG. 7 depicts a flowchart of a method for payment authentication, according to various embodiments.
FIG. 8 depicts a flowchart of a method for payment authentication, according to various embodiments.
FIG. 9 depicts a graphical user interface of an application on a mobile device for payment authentication, according to various embodiments.
FIG. 10 depicts a flowchart of a method for in-store pull authentication, according to various embodiments.
FIG. 11 depicts a flowchart of a method for online pull authentication, according to various embodiments.
FIG. 12 depicts a flowchart of a method for in-store push authentication, according to various embodiments.
FIG. 13 depicts a flowchart of a method for online push authentication, according to various embodiments.
FIG. 14 depicts a block diagram of automated computing machinery, according to various embodiments.
While the invention is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the invention to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
DETAILED DESCRIPTION
Aspects of the present disclosure relate to payment authentication, and, more specifically, to multi-point authentication for payment transactions. While the present disclosure is not necessarily limited to such applications, various aspects of the disclosure may be appreciated through a discussion of various examples using this context.
In order to more securely allow for a customer to use a payment card to make a purchase, a mobile device, which belongs to or is rightfully possessed by the customer, may be utilized. The mobile device may be utilized to validate and verify that a purchase is being made by a customer who is the true cardholder, either through feedback on the mobile device by the user, or by transferring data between the mobile device and a point-of-sale. Alternatively, the transfer of data may occur from a point-of-sale to the mobile device. Through the mobile device, facilitated by a cardholder, the payment association that maintains the payment card in question is contacted, in order to validate whether the purchase is authorized by the true cardholder. The payment association may send or receive an authentication identifier, which would ultimately return to the payment association from either the point-of-sale or the mobile device, and would be validated by the payment association and authenticated if the received authentication identifier is correct. Otherwise the transaction may cancel, and no potentially fraudulent transfer or purchase may be made.
In much of the world, credit or debit cards are commonly used to pay for purchases, both in-store and online. During the process of making a purchase, especially during checkout, the security at a point-of-sale (POS) is often vulnerable and limited. The POS may require a cardholder to sign a physical receipt, a liquid-crystal display (LCD) card reader, or a touchscreen pad, or, alternatively, to enter a few-digit security code (e.g., a card verification value) found on the physical card itself (but generally not stored on the machine-readable magnetic stripe of the card). In some cases, in-store purchases may not require any sort of cardholder identification, and, for smaller purchases, may not even require a signature. Even in cases where a signature is required, the POS card readers' touchscreen quality, accuracy, and precision in signature recognition and reproduction is often so low that a customer may as well make a scribble or draw an “X” on the screen. The input signature generally lacks any usefully identifiable quality, rendering the signature nearly superfluous. This has led to some customers simply “going through the motions” when a signature is required. Even assuming the POS receives a perfect signature, however, the security given by a signature verification can only take effect after a sale has been made, and furthermore may only come into play once a purchase has been officially contested. This may cost time and money. It would be desirable to avoid this situation altogether.
Widely-publicized retail security breaches related to payment and financial services have underscored various security concerns in today's marketplace. During various breaches, names, addresses, card numbers, account numbers and even security codes for accounts and payment cards have been stolen or copied from millions of customers. Continuing challenges for merchants and consumers alike have since resulted. Security breaches of this sort often result from the loss or dissemination of sufficient information to allow others to effectively duplicate payment cards, especially if the information falls into the hands of a reasonably skilled and malicious hacker. Duplicate cards, either virtual or physical, under the current regime, could then be swiped or scanned at an in-store merchant or used for online purchases.
If a physical payment card is lost or if the card is duplicated, the stolen or duplicated card could be misused for at least as long as it takes the true cardholder or the payment association to suspect misuse and cancel. During even a brief time, a large number of fraudulent purchases could take place. Unfortunately, if illicit access is granted to a hacker having a stolen or a duplicate card, for instance, a debit card, the associated bank account could be completely depleted or even overdrawn. In the case of a credit card, a credit line may be maxed out or exceeded, leading to a variety of challenges for the true cardholder. The existing state of payment card security may cost consumers, merchants, and payment associations multiple millions of dollars each year, not only from direct losses, but also indirect losses stemming from damage to trust and resulting reduction of repeat business.
To minimize the security exposures as well as reduce the overall cost of doing business for the merchants and payment associations, multi-point security solutions are proposed, as described herein. Separation of a transaction into different locales, as described herein, may result in an increase in security for the transaction. In this way, a transaction may require not only a physical payment card, but also a mobile device associated with the true holder of the payment card. Hackers, who steal names, addresses, card or account numbers, and card verification value (CVV) codes would no longer have enough information to complete any transaction, since the other component(s) of authentication would be received from another source.
According to various embodiments, today's mobile network and applications (commonly referred to as “apps,” for short) may supply a user (e.g., a consumer, customer, shopper, or cardholder) transaction-specific authorization codes from the payment association (referred to herein generally as “pull authentication”) then in turn supply that code to the merchant to complete a transaction. Another embodiment may involve using a mobile device on a network and application to receive a transaction identifier and authorization identifier from the merchant and transmit the identifiers to the payment association (referred to herein generally as “push authentication”) using a mobile app on the mobile device.
According to various embodiments, a user may choose to or be required to create or set up an account with a payment association, with a unique password and user name, on the website of the payment association. In some cases, the user may also divulge other identifying information, such as biometric data or voiceprints. According to various embodiments, identifying information may include geospatial data. The user may also obtain and install a mobile application, which may enable multi-point authentication. For additional security, the mobile application password may be made to be unique and different from the payment association website login user name and password, leading to even greater security.
As described herein, the eventual loss or misappropriation of payment card information by itself would not be enough for a user, legitimate or not, to complete a transaction. By extension, even a true cardholder may require additional authentication beyond a physical payment card, personal identification number, and/or signature to make a purchase. Stated differently, the credit or debit card number either swiped or entered online becomes, as described herein, a mere ante to start a purchase and no longer an all-in proposition.
Malicious or otherwise, hackers who in the past had stolen millions of credit card numbers from merchants or cardholders would now, as described herein, effectively have useless payment card information, if standing alone. The hackers, not having the mobile device of the user, among other things, would not have the capacity to complete the remainder of the transaction authorization process through the mobile app (provided the hackers did not steal the mobile device or gain unauthorized access to it), resulting in little or no damage to cardholder, merchant or payment association. Even a delay in the hackers accessing a payment account or using a payment card may be enough for a true cardholder to deactivate a payment account or change a payment card number.
According to embodiments, a cardholder may be a person who has possession of a physical payment card or the information stored on a payment card. A cardholder may also be referred to herein as a user, consumer, or customer, among others. The true cardholder, who is the authorized and authentic payment card and payment account holder, may also have a mobile device associated with a payment account that is configured to communicate with a payment association and/or a merchant point-of-sale.
According to embodiments, a payment association may signify a financial services company or companies. A payment association may facilitate electronic funds transfers between parties, where the parties may include consumers, banks, merchants, etc. A payment association, as used herein, may also encompass various financial institutions, including banks, credit unions, and various others. A payment association, as used herein, may also include various servers, devices, computers, and other machines that may be used to facilitate financial services. Additionally, a payment association may include various employees or contractors, performing various tasks and/or duties in the financial services industry, related to one or more financial institutions, according to various embodiments.
According to embodiments, a payment card may refer to what is commonly known as a credit card or a debit card. A credit card may allow a user to make a purchase or receive a cash advance without a positive account balance, whereas a debit card may act like a check from a checking or savings account, where the user has a positive balance that is debited when a purchase is made.
According to embodiments, a payment account may refer to a financial account maintained by a payment association, where the payment account is associated with a cardholder and a mobile device of the cardholder. The payment account may be a bank account, debit card account, a credit line associated with a credit card, or various other financial accounts.
According to embodiments, a point-of-sale (POS) or a POS terminal may be a location where a retail transaction is initiated and/or completed. Herein, a POS may denote a point-of-sale, or a point-of-sale terminal, according to various embodiments, and the terms may be used interchangeably throughout. For example, a customer may desire to make a purchase, the merchant may calculate the amount of money owed to complete the purchase, and the customer may make a payment to a retail merchant to complete the transaction, once validated. A POS may exist both in physical form and in computer or Internet-based form. The POS may contain other features, such as a personal identification number (PIN) pad, a magnetic stripe card reader, and/or a reader for cards equipped with computer chips, among other things.
According to embodiments, a merchant, as used herein, may refer to either a businessperson, business, or entity that trades in, sells, or offers commodities or services, produced by the merchant or by others. The merchant may sell goods or services in small or large quantities and may sell to few or many customers.
FIG. 1 depicts asystem100 for push payment authentication, according to various embodiments.
Apayment association server110 may be in communication with amobile device112 and a point-of-sale (POS)116. ThePOS116 may belong to a merchant, according to various embodiments. ThePOS116 may also be either physical, electronic, and/or virtual, e.g., an Internet-based web page. The POS may also be in communication with themobile device112 through auser114. Theuser114 may facilitate communication between thePOS116 and themobile device112 by handling themobile device112, which may include scanning the mobile device and/or POS, or facilitating communication by various other means.
Thepayment association server110 may also be connected to a network, such as theInternet118, as depicted. Alternatively, thepayment association server110,mobile device112, and thePOS116 may be connected by way of an internet, orother computing network118.
According to various embodiments, communication between various components may occur in a certain “direction,” or flow. Push authentication may refer to communication in a direction where thePOS116 utilizes theuser114 to communicate with themobile device112. Themobile device112 may then transmit data to a server of thepayment association110. The server of thepayment association110 may transmit data to thePOS116, including, but not limited to, an indication that a transaction has been authenticated, or the details of one or more transactions.
The direction of communication is not intended to be construed as strictly occurring in one direction, and may occur in multiple directions or between different components, according to various embodiments.
FIG. 2 depicts asystem200 for pull payment authentication, according to various embodiments.
Apayment association server210 may be in communication with amobile device212 and a point-of-sale (POS)216. ThePOS216 may belong to a merchant, according to various embodiments. ThePOS216 may also be either physical or virtual, e.g., a web page. A virtual POS may include in-app purchases. An in-app purchase may include virtual-to-virtual apps, webpage-to-webpage, or device-to-device schemes. Webpage-to-webpage may include cross-platform use of hypertext markup language (HTML). According to various embodiments, device-to-device may include amobile device212 equipped with a card reader to facilitate a transaction. The POS may also be in communication with themobile device212 through auser214. Theuser214 may facilitate communication between thePOS216 and themobile device212 by handling themobile device212, which may include scanning the mobile device and/or POS, or facilitating communication by various other methods. Various methods of communication may include wireless data transfer using a radio frequency (RF). Examples of wireless data transfer may include radio-frequency identification (RFID), wireless fidelity (Wi-Fi), near-field communication (NFC), among others.
Thepayment association server210 may also be connected to a network, such as theInternet218, as depicted, according to various embodiments. Alternatively, the server of thepayment association210,mobile device212, and thePOS216 may be connected by way of any of various types of networks or internets, such as theInternet218, as described herein.
According to various embodiments, communication between various components may occur in a certain “direction,” or flow, as described herein. Pull authentication may refer to communication in a direction where themobile device212 utilizes theuser214 to communicate with thePOS216. ThePOS216 may then transmit data to thepayment association server210. Thepayment association server210 may transmit data to themobile device212. Thepayment association server210 may transmit data to thePOS216, including, but not limited to, an indication that a transaction has been authenticated.
The direction of communication is not intended to be construed as strictly occurring in one direction, and may occur in multiple directions or between different components, according to various embodiments.
FIG. 3 depicts asystem300 for payment authentication, according to various embodiments.
Apayment association server310 may be in communication with amobile device312 and a point-of-sale (POS)316. ThePOS316 may belong to a merchant, according to various embodiments. ThePOS316 may also be either physical, e.g., a POS equipped LCD touchscreen and/or physical buttons, or virtual, e.g., a web page. Auser314 may be in communication with thePOS316 and themobile device312. Thepayment association server310,mobile device312, and thePOS316 may communicate with one another through a network, such as theInternet318. Communication between various actors through theInternet318 may also be accomplished through a cloud network, or other network.
According to various embodiments, thepayment association server310 and themobile device312 may be in communication, both transmitting to and receiving from each other. Likewise, thepayment association server310 and thePOS316 may be in communication, both transmitting to and receiving from each other. Theuser314 may be in communication with themobile device312, both transmitting and receiving and theuser314 may also be in communication with thePOS316, both transmitting and receiving.
According to various embodiments, theuser314 may desire to make a purchase, where the user would authorize a transfer of payment from a payment account of theuser314 to a merchant at thePOS316. ThePOS316 may receive the indication of the desired purchase, of theuser314 from the merchant, and may transmit the details of the desired purchase to the server of thepayment association310. The server of thepayment association310, after receiving the details of the desired purchase, may relay, by transmitting, the details of the desired purchase to the mobile device of theuser312, and requesting affirmative confirmation before proceeding. If theuser314 signals to themobile device312, such as by pressing a physical or virtual touch screen button, or uttering a voice or other audible command, or various other methods, themobile device312, may transmit the indication to thepayment association server310. The user may communicate with the mobile device through an application loaded on the mobile device. Themobile device312 may receive an indication from theuser314, or may interpret data otherwise received from theuser314. Upon receiving the transmission affirming validity of the transfer of funds from theuser314 to the merchant, thepayment association server310 may authorize the release of funds and transfer the funds to the merchant. ThePOS316 may then receive a transmission from thepayment association server310 indicating that the transaction has been authorized. The merchant, through the POS or otherwise, may then receive indication that the transaction has been validated, or that the funds have been transferred. The merchant may then transfer the goods to the user.
FIG. 4 depicts a flowchart of amethod400 for payment authentication, according to various embodiments.
According to various embodiments, a user may desire to purchase goods and/or services from amerchant410. Accordingly, the user may sign up for secure internet access to apayment account412. A user may then load a secure application for payment account transactions on amobile device414. The user's desired transaction may then be validated416, according to various embodiments. It may then be determined if the validation was successful418. If the validation was successful, the payment may be authorized and a payment association associated with the payment account of the user may process the transaction and transfer the user's funds to themerchant422. If the validation is determined to not have been successful418, then the transaction is not authenticated and may be canceled420. If the transaction is canceled accordingly atoperation420, then a fraud alert may be issued, indicated, and/or transmitted, according to various embodiments.
FIG. 5 depicts a flowchart of amethod500 for payment authentication, according to various embodiments.
Themethod500 for payment authentication may correspond to operation416 ofFIG. 4, among others, according to various embodiments. A POS may assign a transaction identifier (transaction ID) to a potential purchase from amerchant512. Additionally, and in parallel tooperation512, a payment association associated with a payment account of a user may create an authentication identifier (authentication ID) for a particular transaction assigned atransaction ID514, which may be randomized. When the POS has assigned thetransaction ID512 and the payment association has created an authentication ID, a copy of the authentication ID may be transmitted between the payment association and the merchant using a mobile device, and amobile device application516, according to various embodiments. The card association may then receive both the transaction ID and a copy of theauthorization ID518. The payment association may then validate the transaction if the authentication ID and associated transaction ID match the copy of the authentication ID for thesame transaction ID520. Followingoperation520, the method may continue tooperation418 ofFIG. 4, according to various embodiments.
FIG. 6 depicts a flowchart of amethod600 for payment authentication, according to various embodiments.
According to various embodiments, a process may begin, where an indication may be received, indicating that a payment account of a cardholder (i.e., a user) is associated with a mobile device of acardholder610. Thecardholder610 may be the same or similar touser114,214, or314, according to various embodiments. The mobile device may include a mobile device application, where the mobile device application is configured to communicate with a payment association and a payment account of the cardholder, according to various embodiments. The mobile device, as described herein, may be the same or similar to112,212,312, or910, according to various embodiments. The payment association may be the same or similar payment association that maintains thepayment association server110,210, or310, according to various embodiments.
According to various embodiments, the mobile device may be locked with a unique password known by the cardholder. The password may be a secret password known by the cardholder. The cardholder may create the password, or receive the password, according to various embodiments. The mobile device may also be locked to a biometric scan or other biometric qualities of the cardholder, according to various embodiments.
According to various embodiments,operation610 may include receiving, by a point-of-sale (POS) terminal, an indication that a payment account of a cardholder is associated with a mobile device of the cardholder. According to various embodiments, the POS terminal may be a physical POS terminal, an electronic POS (EPOS) terminal, or a computer-based, virtual POS terminal, among other types of points-of-sale. The POS may be the same or similar to116,216, or316, according to various embodiments.
An indication of physical possession of a payment card may also be received612. According to various embodiments,operation612 may include receiving, by the POS terminal, an indication of physical possession of a payment card by a merchant. According to various embodiments, receiving an indication of physical possession of a payment card may include reading the payment card held by the user by swiping a magnetic stripe on the payment card, or reading a computer chip embedded in the payment card, and receiving a personal identification number (PIN) corresponding to the payment card. The user may also hand the physical payment card to a clerk of a merchant, and the clerk may swipe the payment card or enter the numbers of the payment card into a POS or other merchant hardware, according to various embodiments. Alternatively, an indication of physical possession of the payment card may be received where the payment card is not tangible to the POS terminal, and possession is instead inferred through the cardholder entering a unique payment card number, CVV, expiration date, name printed on card, or any other information that may be found on the physical payment card.
A request for authentication of an exchange of funds from the payment account of a cardholder to a merchant may then be received614. According to various embodiments,operation614 may include receiving, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant.
A random transaction ID may then be assigned to the request forauthentication616. According to various embodiments,operation616 may include assigning, by the POS terminal, a randomized transaction ID to the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant.
The request for authentication may then be transmitted618. According to various embodiments,operation618 may include transmitting, by the POS terminal, the request for the authorization of an exchange of funds from the payment account of the cardholder to the merchant and the assigned randomized transaction ID.
A randomized authentication ID associated with the random transaction ID may then be received620. According to various embodiments,operation620 may include receiving by the POS terminal, a randomized authentication ID associated with the assigned randomized transaction ID, from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid.
A copy of the authentication ID may then be received through the mobile device, facilitated by a cardholder, after the mobile device received theauthentication ID622. According to various embodiments,operation622 may include receiving, by the POS terminal, a copy of the randomized authentication ID through the mobile device, facilitated by a cardholder, where the mobile device receives the randomized authentication ID from the payment association.
According to various embodiments, the randomized authentication ID may be received through the mobile device, facilitated by a cardholder, by reading a one or two-dimensional barcode. According to various embodiments, the randomized authentication ID may also be received by a wireless transmission, or received visually or aurally.
Validation that the received copy of the authentication ID matches the randomized authentication ID may be received624 and the process may end. According to various embodiments,operation624 may include receiving, by the POS terminal, validation that the received copy of the randomized authentication ID matches the randomized authentication ID. Various embodiments may include completing a transaction in response to validation that the received copy of the randomized authentication ID matches the randomized authentication ID.
According to various embodiments, a payment association computing device may perform various operations. The operations performed by the payment association computing device may correspond to various operations610-624, according to various embodiments, but performed by the payment association computing device in place of the POS terminal, although various other combinations not listed are also contemplated. Further, operations equivalent to610-624 and variations thereof are contemplated as performed by various other machines, devices, computers, etc.
According to various embodiments, the payment association computing device may receive an indication that a payment account of a cardholder is associated with a mobile device of the cardholder. According to various embodiments, the payment association computing device may further receive indication of physical possession of a payment card by a merchant at a point-of-sale (POS) terminal. According to various embodiments, the payment association computing device may further receive a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant at the POS terminal.
According to various embodiments, the payment association computing device may further transmit an assigned randomized transaction ID and a randomized authentication ID to the POS terminal, where the assigned randomized transaction ID and the randomized authentication ID are used to determine whether the request for the authorization of the exchange of funds is valid. The randomized transaction ID may be randomized during, before, or after an assignment process. Additionally, the randomized authentication ID may be randomized during, before, or after an assignment process. The randomization and assignment for the transaction ID and/or authentication ID may utilize a representation including number of alphanumeric characters, among other forms, and may be stored in various memory or other computer-based storage, according to various embodiments. According to various embodiments, the payment association computing device may further transmit, to the POS terminal, a copy of the authentication ID through the mobile device, facilitated by a cardholder, where the mobile device receives the authentication ID from the payment association. According to various embodiments, the payment association computing device may further transmit, to the POS terminal, validation that the received copy of the authentication ID matches the authentication ID.
FIG. 7 depicts a flowchart of amethod700 for payment authentication, according to various embodiments.
According to various embodiments, a process may begin, where an indication may be received, indicating that a payment account of a cardholder (i.e., a user) is associated with a mobile device of acardholder710. Thecardholder710 may be the same or similar touser114,214, or314, according to various embodiments. The mobile device may include a mobile device application, where the mobile device application is configured to communicate with a payment association and a payment account of the cardholder, according to various embodiments. The mobile device, as described herein, may be the same or similar to112,212,312, or910, according to various embodiments. The payment association may be the same or similar payment association that maintains thepayment association server110,210, or310, according to various embodiments.
According to various embodiments,operation710 may include receiving, by a point-of-sale (POS) terminal, an indication that a payment account of a cardholder is associated with a mobile device of the cardholder. According to various embodiments, the POS terminal may be a physical POS terminal, an electronic POS (EPOS) terminal, or a computer-based POS terminal, among other types of points-of-sale. The POS may be the same or similar to116,216, or316, according to various embodiments.
According to various embodiments, the mobile device may be locked with a unique password known by the cardholder. The mobile device may also be locked to a biometric scan of the cardholder, according to various embodiments.
An indication of physical possession of a payment card may also be received712. According to various embodiments,operation712 may include receiving, by the POS terminal, an indication of physical possession of a payment card by a merchant. According to various embodiments, receiving an indication of physical possession of a payment card may include reading the payment card held by the user by swiping a magnetic stripe on the payment card, or reading a computer chip embedded in the payment card, and receiving a personal identification number (PIN) corresponding to the payment card. The user may also hand the physical payment card to a clerk of a merchant, and the clerk may swipe the payment card or enter the numbers of the payment card into a POS or other merchant hardware, according to various embodiments. Alternatively, an indication of physical possession of the payment card may be received where the payment card is not tangible to the POS terminal, and possession is instead inferred through the cardholder entering a unique payment card number, CVV, expiration date, name printed on card, or any other information that may be found on the physical payment card.
A request for authentication of an exchange of funds from the payment account of a cardholder to a merchant may then be received714. According to various embodiments,operation714 may include receiving, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant.
A random transaction ID may then be assigned to the request forauthentication716. According to various embodiments,operation716 may include assigning, by the POS terminal, a randomized transaction ID to the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant.
The request for authentication may then be transmitted718. According to various embodiments,operation718 may include transmitting, by the POS terminal, the request for the authorization of an exchange of funds from the payment account of the cardholder to the merchant and the assigned randomized transaction ID.
A randomized authentication ID associated with the randomized transaction ID may then be received720. According to various embodiments,operation720 may include receiving by the POS terminal, a randomized authentication ID associated with the assigned randomized transaction ID, from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid.
A copy of the authentication ID may then be transmitted to the mobile device, facilitated by a cardholder, after the POS received theauthentication ID722. According to various embodiments,operation722 may include transmitting, by the POS terminal, a copy of the randomized authentication ID to the mobile device, facilitated by a cardholder, where the POS terminal receives the randomized authentication ID from thepayment association722.
According to various embodiments, the randomized authentication ID may be received through the POS terminal, by reading a one or two-dimensional barcode. According to various embodiments, the randomized authentication ID may also be received by a wireless transmission, or received visually or aurally. The randomized authentication ID, if received by visual wireless transmission through the POS terminal, may be received through visual signals, codes, texts, symbols, light flashes, etc. The visual transmission may include transmissions through light (i.e., electromagnetic radiation) in the human-visible regions of the electromagnetic spectrum, but may also include transmissions above or below what is visible to a human. The randomized authentication ID, if received by aural wireless transmission through the POS terminal, may be received through aural sounds, signals, etc., whether in the audible-to-human spectrum, above, or below. In other words, sounds may be transmitted that are not typically audible to a human.
Validation that the received copy of the authentication ID matches the randomized authentication ID may be received724 and the process may end. According to various embodiments,operation724 may include receiving, by the POS terminal, validation that the received copy of the randomized authentication ID matches the randomized authentication ID.
Various embodiments may include completing a transaction in response to validation that the received copy of the randomized authentication ID matches the randomized authentication ID.
According to various embodiments, a payment association computing device may perform various operations. The operations performed by the payment association computing device may correspond to various operations710-724, according to various embodiments, but performed by the payment association computing device in place of the POS terminal, although various other combinations not listed are also contemplated. Further, operations equivalent to710-724 and variations thereof are contemplated as performed by various other machines, devices, computers, etc.
According to various embodiments, the payment association computing device may receive an indication that a payment account of a cardholder is associated with a mobile device of the cardholder. According to various embodiments, the payment association computing device may further receive an indication of physical possession of a payment card by a merchant at a point-of-sale (POS) terminal. According to various embodiments, the payment association computing device may further receive a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant at a POS terminal.
According to various embodiments, the payment association computing device may further receive a randomized transaction ID to the request for the authorization of the exchange of funds. According to various embodiments, the payment association computing device may further receive, by the POS terminal, a request for an authorization of the exchange of funds from the payment account of the cardholder to the merchant. According to various embodiments, the payment association computing device may further transmit to the POS terminal, the randomized transaction ID and a randomized authentication ID associated with the transaction ID, where the transaction ID and the randomized authentication ID are used to determine whether the request for the authorization of the exchange of funds is valid.
According to various embodiments, the payment association computing device may further transmit, through the POS terminal, a copy of the authentication ID to the mobile device. According to various embodiments, the payment association computing device may further transmit, to the POS terminal, validation that the transmitted copy of the authentication ID from the mobile device matches the authentication ID.
FIG. 8 depicts aflowchart800 of a method for payment authentication, according to various embodiments.
According to various embodiments, a process may begin, where it may be determined that a payment account is associated with a mobile device of a cardholder (i.e., a user)810. Thecardholder810 may be the same or similar touser114,214, or314, according to various embodiments. According to various embodiments,operation810 may include determining, by a payment association computing device, that a payment account of a cardholder is associated with a mobile device of the cardholder. According to various embodiments, the payment association computing device may be a server. The mobile device may include a mobile device application, where the mobile device application is configured to communicate with a payment association and a payment account of the cardholder, according to various embodiments. The mobile device, as described herein, may be the same or similar to112,212,312, or910, according to various embodiments. The payment association computing device may be the same or similar to thepayment association server110,210, or310, according to various embodiments.
According to various embodiments, the mobile device may be locked with a unique password known by the cardholder, as described herein. The mobile device may also be locked to a biometric scan of the cardholder, as described herein, according to various embodiments.
An indication of physical possession of a payment card may also be received812. According to various embodiments,operation812 may include receiving, by the payment association computing device, an indication of physical possession of a payment card by a merchant. According to various embodiments, receiving an indication of physical possession of a payment card may include reading the payment card held by the user by swiping a magnetic stripe on the payment card, or reading a computer chip embedded in the payment card, and receiving a personal identification number (PIN) corresponding to the payment card. The user may also hand the physical payment card to a clerk of a merchant, and the clerk may swipe the payment card or enter the numbers of the payment card into a POS or other merchant hardware, according to various embodiments. Alternatively, an indication of physical possession of the payment card may be received where the payment card is not tangible to the POS terminal, and possession is instead inferred through the cardholder entering a unique payment card number, CVV, expiration date, name printed on card, or any other information that may be found on the physical payment card.
According to various embodiments, receiving an indication of physical possession of a payment card may be performed by the POS terminal. According to various embodiments, the POS terminal may be a physical POS terminal, an electronic POS (EPOS) terminal, or a computer-based POS terminal, among other types of points-of-sale. The POS may be the same or similar to116,216, or316, according to various embodiments.
A request for authentication of an exchange of funds from the payment account of a cardholder to a merchant may then be received814. According to various embodiments,operation814 may include receiving, by the payment association computing device, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant. According to various embodiments, the request for the exchange of funds may represent a purchase.
An assigned randomized transaction ID to the request may then be received816. According to various embodiments,operation816 may include receiving, by the payment association computing device, an assigned randomized transaction ID to the request for the authorization of the exchange of funds. Information regarding the exchange may then be transmitted to themobile device818. According to various embodiments,operation818 may include transmitting, by the payment association computing device, to the mobile device, information regarding the exchange of funds assigned the randomized transaction ID.
A request for confirmation may then be transmitted to themobile device820, according to various embodiments. According to various embodiments,operation820 may include transmitting, by the payment association computing device, to the mobile device, a request for confirmation. The transmitting of the request for confirmation may be transmitted to the mobile device in response to transmitting the information regarding the exchange of funds, of the authorization from the cardholder from the payment account of the cardholder to the merchant.
An indication may then be received through the mobile device, facilitated by a cardholder, indicating that the exchange of funds is authorized822. According to various embodiments,operation822 may include receiving, by the payment association computing device, an indication, through the mobile device. The indication received through the mobile device may be received in response to transmitting the request for confirmation, that the exchange of funds assigned the randomized transaction ID from the payment account of the cardholder to the merchant is authorized. According to various embodiments,operation822 may also include displaying the information regarding the exchange of funds that has been assigned the randomized transaction ID to the cardholder on the mobile device.
The exchange of funds may be authorized if authorization is received from themobile device824, and the process may end. According to various embodiments,operation824 may include authorizing, by the payment association computing device, the exchange of funds assigned the randomized transaction ID from the payment account of the cardholder to the merchant. The exchange of funds assigned the randomized transaction ID may be authorized in response to the received indication that the cardholder authorizes the exchange of funds that has been assigned the randomized transaction ID from the payment account of the cardholder to the merchant.
FIG. 9 depicts agraphical user interface900 of an application on a mobile device for payment authentication, according to various embodiments.
Mobile device910 may belong to a user, and the user may also be a cardholder with an associated payment account and payment card. According to various embodiments, themobile device910 may be a smartphone, or other form of telephone. Themobile device910 may also be any other form of mobile device, including a laptop computer, tablet, personal digital assistant (PDA), head-mounted device, wearable device, etc. The mobile device, as described herein, may be the same or similar to112,212, or312, according to various embodiments.
According to various embodiments, a cardholder may desire to make a purchase at a merchant. The cardholder may be a customer, according to various embodiments. The cardholder may have amobile device910, according to various embodiments. The cardholder may desire to purchase a bicycle tire from a bicycle shop (a merchant) that the cardholder has visited in person. The cardholder may initiate a purchase with the bicycle shop, and indicate a desire to pay for the bicycle tire using a credit card (a payment card). A clerk at the bicycle shop may indicate that there is a POS with which the cardholder may swipe his or her card to initiate a purchase, or a self-checkout POS may be utilized. Upon swiping or otherwise scanning the cardholder's payment card, the cardholder'smobile device910 may receive a message containing a request forauthorization914. The request for authorization may also includevarious transaction data912, including the name of the merchant, the address of the merchant, the amount of the merchant, etc. For example, in the embodiment shown, the merchant is listed as “Bubzki's Bike Shop,” the address is listed as “Minneapolis, Minn.,” and the amount is listed as “$45.66.” The cardholder may study and confirm thetransaction data912, and the cardholder may indicate whether the transaction is authorized. The cardholder may indicate whether the transaction is authorized by utilizing a button ormultiple buttons916 located on a graphical user interface (GUI) of the mobile device. For example, thebuttons916 may include “Yes,” “No,” “Authorize,” “Cancel,” or various other indications that may be communicated to a payment server of a payment association, and may ultimately be transmitted to the POS at the merchant, determining whether the cardholder's payment will be accepted, as described herein.
FIG. 10 depicts a flowchart of amethod1000 for in-store pull authentication, according to various embodiments.
A user (or, a cardholder or a consumer) may sign up for Internet access to apayment account1010. The payment account and payment card may then be linked to a mobile device and a pull verification mobile device application may be downloaded, using a unique password for theapplication1012. The user may manually start a purchase by swiping or scanning the payment card at a merchant point-of-sale (POS)1014.
The merchant POS may then send a transaction ID and verification request to an associated payment association of the card that was swiped1016. The payment association may then send a unique authentication ID (ID) linked to the current transaction to the user'smobile application1018. The authentication ID could be a variety of implementations including, but not limited to, a number, alphanumerics, or a one or two-dimensional barcode (such as a quick-reference “QR” code).
The user may then launch the pull verification application on themobile device1020. The user may then enter, scan or transmit the authentication ID into the merchant'sPOS hardware1022. The entered ID may then be transmitted back to the payment association to validate the combination of the payment card data, transaction ID, andauthentication ID1024. The payment association may process the data and may return atransaction validation1026 notification back to the merchant to complete the transaction. If any of the data (e.g., payment card number, transaction ID, or authentication ID) is not consistent, then the transaction may be rejected.Transaction validation1026 may utilize a process similar to that described inFIG. 5, according to various embodiments.
FIG. 11 depicts a flowchart of amethod1100 for online pull authentication, according to various embodiments.
A user (or, a cardholder or a consumer) may sign up for Internet access to apayment account1110. The payment account and payment card may then be linked to a mobile device and a pull verification mobile device application may be downloaded, using a unique password for theapplication1112. The user may start a purchase by entering the card information of the payment card at a merchantweb payment form1114. The user may arrive at a “check-out” webpage and may accordingly fill in the required payment card information. The user may click “apply” for processing the transaction.
The merchant may then send the transaction ID and transaction data to the payment association forverification1116. A response may be transmitted from the payment association to the merchant to proceed foradditional verification1118. The merchant may then add or present a new form or one or more supplemental fields on the current form to capture an authentication code from theuser1120.
In parallel the payment association may send a unique authentication ID linked to the current transaction to the user's mobile device andmobile device application1122. The authentication ID could be a variety of implementations including but not limited to a number, alphanumerics, or a one- or two-dimensional barcode (e.g., a quick-reference (QR) code). The user may receive the sent unique authentication ID and then enter the unique authentication ID that could be a number/word/phrase (alphanumeric) into the supplemental authentication form field of theweb payment form1126. The user may then indicate, e.g., by clicking or tapping, “apply.”
The entered ID may then be transmitted back to the payment association to validate the combination of the payment card data, transaction ID, andauthentication ID1128. The transaction may be validated, e.g., by thepayment association1130. The validation of the transaction may follow a similar flow asFIG. 5, among others. After the payment association has processed the data, the payment association may transmit a notification of transaction validation back to the merchant POS, allowing the user to complete the transaction. The payment association may utilize one or more servers and/or clients in order to complete various operations, including transaction validation. During transaction validation, if any of the data is not consistent, payment card number, transaction ID, and authentication ID then the transaction may be rejected.
FIG. 12 depicts a flowchart of amethod1200 for in-store push authentication, according to various embodiments.
A user (or, a cardholder or a consumer) may sign up for Internet access to apayment account1210. The payment account and payment card may then be linked to a mobile device and a push verification mobile device application may be downloaded, using a unique password for theapplication1212. A purchase may be started by the user swiping a payment card at a merchant point-of-sale (POS)1214. The merchant POS may then create and send a transaction identifier (ID) and a payment transaction request to the payment association of the card that was swiped1216.
The user, having the mobile device, may then launch the push verification mobile device application, using the unique password for theapplication1218, according to various embodiments. The payment association may alternatively assign and transmit a unique transaction ID to the merchant POS, instead of the payment association receiving an assigned transaction ID from the merchant POS. The transaction ID could be a variety of implementations including but not limited to a number, alphanumerics, or a one or two-dimensional barcode (e.g., a quick reference (QR) code). The payment association may assign an authentication ID to the transaction ID, and transmit the authentication ID to the merchant POS, which may await further or final authorization and action from theuser1220. The user may then enter, scan, or transmit the authentication ID into the mobile device application from the merchant'sPOS1222.
The mobile device application may transmit the transaction ID and associated authentication ID, or a hashed variation thereof, back to the payment association as authentication for the transaction associated with the assignedtransaction ID1224. The transmission of the transaction ID and/or associated authentication ID may serve as authorization/acceptance of the current transaction duringtransaction validation1226. The payment association may then signal the merchant that the transaction is accepted. If any of the data (e.g., payment card number, transaction ID, authentication ID, mobile response transaction or hashed transaction ID, or authentication ID) is not consistent, then the transaction may be rejected.
FIG. 13 depicts a flowchart of amethod1300 for online push authentication, according to various embodiments.
A user (or, a cardholder or a consumer) may begin by signing up for Internet access to apayment account1310. The payment account and associated payment card may then be linked to a mobile device and a push verification mobile device application may be downloaded, using a unique password for theapplication1312.
A user may desire to make a purchase online, and the user may arrive at a merchant web payment form, e.g., a “check-out” webpage, and the user may enter various requiredpayment card information1314. The user may then click “apply” for processing, or “submit order,” according to various embodiments. The merchant POS may assign and then send a transaction ID and request to the payment association for a transfer of funds to complete the order of theuser1316.
The payment association may alternatively assign a transaction ID to the request from the merchant POS. The payment association, whether or not it assigned the transaction ID, may transmit the transaction ID to themerchant1318, according to various embodiments. The merchant may displays a new form or supplemental fields with transaction ID displayed. The transaction ID could be a variety of implementations including but not limited to a number, alphanumerics, barcode, or QR code. One or more web payment form fields may then be added1320. The transaction ID may be displayed, according to various embodiments. In parallel tooperation1318 and1320, the user may launch the push verification application on themobile device1322. Additionally, the payment association may assign a randomized authentication ID and may transmit the randomized authentication ID to the mobile application on the mobile device of theuser1324.
Fromoperation1324 and/or1320, according to various embodiments, the authentication ID and/or transaction ID may be entered or scanned from the displayed merchant webpage to themobile device1326. Using the mobile application the user may enter or scan the unique transaction ID displayed on the webpage. The mobile application may send the authentication ID, the transaction ID, or hashed version of the authentication ID or transaction ID back to the payment association for processing. The payment association may signal the merchant that the transaction is valid. If any of the data (e.g., payment card number, authentication ID, or mobile response transaction or hashed authentication ID) is not consistent, then the transaction may be rejected.
FIG. 14 depicts a block diagram of automated computing machinery, according to various embodiments. The automated computing machinery may represent a POS terminal, a payment association server, or a payment association computing device, among others, according to various embodiments. The example computing machinery may include acomputer1410 useful in performing aspects of the disclosure, according to various embodiments. Thecomputer1410 ofFIG. 14 includes at least onecomputer processor1418 or central processing unit (CPU) as well as random access memory1415 (RAM) which is connected through bus adapter1417 toprocessor1418 and to other components of thecomputer1410. The computing machinery or theprocessor1418 may include one or more computer processing circuits.
TheRAM1415 may include anauthentication application1414. Theauthentication application1414 may access or control various functions of the computer's1400RAM1415, according to various embodiments. The authentication application's1414 instructions and authentication andtransaction IDs1434 may be stored to or read fromdata storage1416, which may be a hard disk drive, according to various embodiments. The memory controller's communications may be received from various modules located in theRAM1415.
TheRAM1415 may include a payment association module1412. The payment association module's1412 instructions may be populated into thedata storage1416. Theauthentication application1414 may control when to authenticate a payment transaction. Theauthentication application1414 may access a point-of-sale module1406 and a payment association module1412, according to various embodiments. The point-of-sale module1406 may control oxide deposition during a FET-making process, according to various embodiments. The payment association module1412 may control various processes associated with a payment association during a payment authentication process, according to various embodiments. The point-of-sale module1406 and the payment association module1412 may be stored indata storage1416, according to various embodiments. Additional modules may be included in theauthentication application1414, according to various embodiments.
TheRAM1415 may include anoperating system1419. Operating systems useful for record filtering according to embodiments of the present disclosure include UNIX®, Linux®, Microsoft XP™, AIX®, IBM's i5/OS™, and others. Theoperating system1419 is shown inRAM1415, but many components of such software typically are stored in non-volatile memory also, such as, for example, on adisk drive1416.
Thecomputer1410 may also includedisk drive adapter1420 coupled throughexpansion bus1432 and bus adapter1417 toprocessor1418 and other components of thecomputer1410.Disk drive adapter1420 connects non-volatile data storage to thecomputer1410 in the form of disk drive (data storage)1416. Disk drive adapters useful in computers include Integrated Drive Electronics (IDE) adapters, Small Computer System Interface (SCSI) adapters, Serial AT Attachment (SATA), and others. Non-volatile computer memory also may be implemented for as an optical disc drive, electrically erasable programmable read-only memory (so-called ‘EEPROM’ or ‘Flash’ memory), RAM drives, etc.
Thedata storage1416 may include one or more storage devices in a tiered or non-tiered configuration. Thedata storage1416 may include one or more memory chip thermal profile inputs that are received by the application and stored for later use by theauthentication application1414 throughRAM1415.
The example computer1400 may include one or more input/output (I/O)adapters1422. I/O adapters implement user-oriented input/output through, for example, software drivers and computer hardware for controlling output to display devices such ascomputer display screens1424, as well as user input from one or moreuser input devices1426 such as keyboards, mice, styli, or touchscreens, according to various embodiments. The example computer1400 may include a video adapter at1409, which is an example of an I/O adapter specially designed for graphic output to adisplay device1424 such as a display screen or computer monitor. The video adapter (I/O) would be connected toprocessor1418 through a bus adapter1417, and thefront side bus1428, which is also a high-speed bus.
Theexample computer1410 includes acommunications adapter1430 for data communications with other computers, for example, mobile device(s)1401, and for data communications with adata communications network1408. Such data communications may be carried out serially through RS-232 connections, through external buses such as a Universal Serial Bus (USB), through data communications networks such as IP data communications networks, and in other ways as will occur to those of skill in the art. Communications adapters implement the hardware level of data communications through which one computer sends data communications to another computer, directly or through adata communications network1408. Examples of communications adapters include modems for wired dial-up communications, Ethernet (IEEE 802.3) adapters for wired data communications network communications, and IEEE 802.77 adapters for wireless data communications network communications.
The descriptions of the various embodiments of the present disclosure have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of skill in the art to understand the embodiments disclosed herein.
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or act or carry out combinations of special purpose hardware and computer instructions.
The descriptions of the various embodiments of the present disclosure have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

The invention claimed is:
1. A system for use with a host payment association server that is configured to validate transactions of a payment account and communicate with a linked mobile device that is configured to validate payment transactions, comprising:
one or more computer processor circuits that are configured to host a transaction validation application that is configured to:
receive, by a point-of-sale (POS) terminal, a first indication that a payment account of a cardholder is associated with a mobile device of the cardholder;
receive, by the POS terminal, after receiving the first indication, a second indication of physical possession of a payment card by a merchant;
receive, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant;
assign, by the POS terminal, a randomized transaction identifier to the request for the authorization of the exchange of funds;
transmit, by the POS terminal, the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant;
receive, by the POS terminal, the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid;
transmit, by the POS terminal, a copy of the randomized authentication identifier to the mobile device; and
receive, by the POS terminal, validation that the copy of the randomized authentication identifier transmitted to the mobile device from the POS terminal matches the randomized authentication identifier.
2. The system ofclaim 1, wherein the POS terminal is a physical POS terminal.
3. The system ofclaim 1, wherein the POS terminal is a computer-based POS terminal.
4. The system ofclaim 1, wherein the transaction validation application is configured to transmit, by the POS terminal, a copy of the randomized authentication identifier through the mobile device, visually.
5. The system ofclaim 1, wherein the transaction validation application is configured to transmit, by the POS terminal, a copy of the randomized authentication identifier through the mobile device, aurally.
6. The system ofclaim 1, wherein the mobile device includes a mobile device application, wherein the mobile device application is configured to communicate with the payment association and the payment account of the cardholder.
7. A computer program product comprising a computer readable storage device having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to:
receive, by a point-of-sale (POS) terminal, a first indication that a payment account of a cardholder is associated with a mobile device of the cardholder;
receive, by the POS terminal, after receiving the first indication, a second indication of physical possession of a payment card by a merchant;
receive, by the POS terminal, a purchase request for an authorization of an exchange of funds from the payment account of the cardholder to the merchant;
assign, by the POS terminal, a randomized transaction identifier to the request for the authorization of the exchange of funds;
transmit, by the POS terminal, the request for the authorization of the exchange of funds from the payment account of the cardholder to the merchant;
receive, by the POS terminal, the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange of funds is valid;
transmit, by the POS terminal, a copy of the randomized authentication identifier to the mobile device; and
receive, by the POS terminal, validation that the copy of the randomized authentication identifier transmitted to the mobile device from the POS terminal matches the randomized authentication identifier.
8. The computer program product ofclaim 7, wherein the computer readable program further causes the computing device to:
transmit, by the POS terminal, a copy of the randomized authentication identifier through the mobile device, by a wireless transmission.
9. The computer program product ofclaim 7, wherein the computer readable program further causes the computing device to:
transmit, by the POS terminal, a copy of the randomized authentication identifier through the mobile device, visually.
10. The computer program product ofclaim 7, wherein the computer readable program further causes the computing device to:
transmit, by the POS terminal, a copy of the randomized authentication identifier through the mobile device, aurally.
US14/662,3232015-03-192015-03-19Multi-point authentication for payment transactionsActive2036-03-11US9892396B2 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US14/662,323US9892396B2 (en)2015-03-192015-03-19Multi-point authentication for payment transactions
US14/669,626US10055723B2 (en)2015-03-192015-03-26Multi-point authentication for payment transactions
PCT/CN2016/076594WO2016146071A1 (en)2015-03-192016-03-17Multi-point authentication for payment transactions
US15/858,054US11017370B2 (en)2015-03-192017-12-29Multi-point authentication for payment transactions
US16/288,808US11017371B2 (en)2015-03-192019-02-28Multi-point authentication for payment transactions

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US14/662,323US9892396B2 (en)2015-03-192015-03-19Multi-point authentication for payment transactions

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US14/669,626ContinuationUS10055723B2 (en)2015-03-192015-03-26Multi-point authentication for payment transactions
US15/858,054ContinuationUS11017370B2 (en)2015-03-192017-12-29Multi-point authentication for payment transactions

Publications (2)

Publication NumberPublication Date
US20160275508A1 US20160275508A1 (en)2016-09-22
US9892396B2true US9892396B2 (en)2018-02-13

Family

ID=56924974

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US14/662,323Active2036-03-11US9892396B2 (en)2015-03-192015-03-19Multi-point authentication for payment transactions
US14/669,626Active2036-08-24US10055723B2 (en)2015-03-192015-03-26Multi-point authentication for payment transactions
US15/858,054Active2036-01-24US11017370B2 (en)2015-03-192017-12-29Multi-point authentication for payment transactions
US16/288,808ActiveUS11017371B2 (en)2015-03-192019-02-28Multi-point authentication for payment transactions

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/669,626Active2036-08-24US10055723B2 (en)2015-03-192015-03-26Multi-point authentication for payment transactions
US15/858,054Active2036-01-24US11017370B2 (en)2015-03-192017-12-29Multi-point authentication for payment transactions
US16/288,808ActiveUS11017371B2 (en)2015-03-192019-02-28Multi-point authentication for payment transactions

Country Status (1)

CountryLink
US (4)US9892396B2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3089497A1 (en)*2015-04-302016-11-02Gemalto SaMethod, requester device, verifier device and server for proving at least one piece of user information
US11074325B1 (en)*2016-11-092021-07-27Wells Fargo Bank, N.A.Systems and methods for dynamic bio-behavioral authentication
CN109102297A (en)*2018-09-042018-12-28深圳市百宝廊珠宝首饰有限公司Revocable payment method and device
CN110969437B (en)*2018-09-282024-04-16京东科技控股股份有限公司Method, system, electronic device and medium for obtaining virtual bank card payment authority
CN110336776B (en)*2019-04-282021-09-28杭州电子科技大学Multi-point cooperative authentication system and method based on intelligent user image acquisition
US11076043B2 (en)*2019-10-042021-07-27Red Box Recorders LimitedSystems and methods of voiceprint generation and use in enforcing compliance policies
CN111181987A (en)*2020-01-022020-05-19随锐科技集团股份有限公司Secondary verification method and system based on cloud different terminal devices
WO2022208238A1 (en)*2021-03-312022-10-06Jio Platforms LimitedSystem and method for secure and contactless fund transfer in open and closed loop transactions
US11463130B1 (en)*2021-10-132022-10-04Roku, Inc.Proving physical possession of internet-of-things (IoT) devices
US12406055B2 (en)2022-11-102025-09-02Bank Of America CorporationSystem and method for identifying and redirecting incoming unauthorized data access requests
US12407684B2 (en)2022-11-102025-09-02Bank Of America CorporationSystem and method for implementing authentication control protocols via components of an entity device

Citations (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2002005224A2 (en)2000-07-102002-01-17Paypal, Inc.System and method for verifying a financial instrument
US20020052842A1 (en)*2000-08-252002-05-02Marko SchubaInitiation of an electronic payment transaction
WO2005001670A2 (en)*2003-06-302005-01-06Selvanathan NarainsamyTransaction verification system
EP1802155A1 (en)*2005-12-212007-06-27Cronto LimitedSystem and method for dynamic multifactor authentication
US20080103984A1 (en)*2006-10-302008-05-01Mobilekash, Inc.System, Method, and Computer-Readable Medium for Mobile Payment Authentication and Authorization
US20090057393A1 (en)2007-08-282009-03-05American Express Travel Related Services Co., Inc.System and method for completing a secure financial transaction using a wireless communications device
CN101894424A (en)2009-05-212010-11-24北京西阁万投资咨询有限公司Trading card processing system and method for improving safety
US20110137797A1 (en)*2008-05-302011-06-09Luc StalsServer Device for Controlling a Transaction, First Entity and Second Entity
US20110191244A1 (en)*2010-02-022011-08-04Xia DaiSecured Transaction System
US20110191252A1 (en)*2010-02-022011-08-04Xia DaiSecured Point-Of-Sale Transaction System
US20120129492A1 (en)*2010-11-182012-05-24Eagle River Holdings LlcSystem and method for transaction authentication using a mobile communication device
US20120157062A1 (en)2010-12-162012-06-21Boku, Inc.Systems and Methods to Selectively Authenticate via Mobile Communications
US8347370B2 (en)2008-05-132013-01-01Veritrix, Inc.Multi-channel multi-factor authentication
US20130030934A1 (en)2011-01-282013-01-31Zumigo, Inc.System and method for credit card transaction approval based on mobile subscriber terminal location
US8365988B1 (en)*2008-04-112013-02-05United Services Automobile Association (Usaa)Dynamic credit card security code via mobile device
US20130132181A1 (en)2007-11-302013-05-23Blaze Mobile, Inc.Remote transaction processing with multiple payment methods using authentication
US8468582B2 (en)2009-02-032013-06-18Inbay Technologies Inc.Method and system for securing electronic transactions
US20130297509A1 (en)2012-05-072013-11-07Infosys LimitedMobile payment using dynamic authorization code and multi-payer shared card number
USRE44669E1 (en)*2006-01-182013-12-24Mocapay, Inc.Systems and method for secure wireless payment transactions
US8620810B2 (en)2010-04-022013-12-31Isignthis Ltd.Methods and systems for verifying transactions
US20140358777A1 (en)*2013-05-312014-12-04How Kiap GuehMethod for secure atm transactions using a portable device
US20150348044A1 (en)*2014-05-302015-12-03Verizon Patent And Licensing Inc.Secure credit card transactions based on a mobile device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10706402B2 (en)*2008-09-222020-07-07Visa International Service AssociationOver the air update of payment transaction data stored in secure memory
US9779396B2 (en)*2012-08-142017-10-03Chijioke Chukwuemeka UZOMethod of making mobile payments to a recipient lacking a wireless or contactless terminal
US20140279554A1 (en)*2013-03-122014-09-18Seth PriebatschDistributed authenticity verification for consumer payment transactions

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2002005224A2 (en)2000-07-102002-01-17Paypal, Inc.System and method for verifying a financial instrument
US20020052842A1 (en)*2000-08-252002-05-02Marko SchubaInitiation of an electronic payment transaction
WO2005001670A2 (en)*2003-06-302005-01-06Selvanathan NarainsamyTransaction verification system
EP1802155A1 (en)*2005-12-212007-06-27Cronto LimitedSystem and method for dynamic multifactor authentication
USRE44669E1 (en)*2006-01-182013-12-24Mocapay, Inc.Systems and method for secure wireless payment transactions
US20080103984A1 (en)*2006-10-302008-05-01Mobilekash, Inc.System, Method, and Computer-Readable Medium for Mobile Payment Authentication and Authorization
US20090057393A1 (en)2007-08-282009-03-05American Express Travel Related Services Co., Inc.System and method for completing a secure financial transaction using a wireless communications device
US20130132181A1 (en)2007-11-302013-05-23Blaze Mobile, Inc.Remote transaction processing with multiple payment methods using authentication
US8365988B1 (en)*2008-04-112013-02-05United Services Automobile Association (Usaa)Dynamic credit card security code via mobile device
US8347370B2 (en)2008-05-132013-01-01Veritrix, Inc.Multi-channel multi-factor authentication
US20110137797A1 (en)*2008-05-302011-06-09Luc StalsServer Device for Controlling a Transaction, First Entity and Second Entity
US8468582B2 (en)2009-02-032013-06-18Inbay Technologies Inc.Method and system for securing electronic transactions
CN101894424A (en)2009-05-212010-11-24北京西阁万投资咨询有限公司Trading card processing system and method for improving safety
US20110191252A1 (en)*2010-02-022011-08-04Xia DaiSecured Point-Of-Sale Transaction System
US20110191244A1 (en)*2010-02-022011-08-04Xia DaiSecured Transaction System
US8620810B2 (en)2010-04-022013-12-31Isignthis Ltd.Methods and systems for verifying transactions
US20120129492A1 (en)*2010-11-182012-05-24Eagle River Holdings LlcSystem and method for transaction authentication using a mobile communication device
US20120157062A1 (en)2010-12-162012-06-21Boku, Inc.Systems and Methods to Selectively Authenticate via Mobile Communications
US20130030934A1 (en)2011-01-282013-01-31Zumigo, Inc.System and method for credit card transaction approval based on mobile subscriber terminal location
US20130297509A1 (en)2012-05-072013-11-07Infosys LimitedMobile payment using dynamic authorization code and multi-payer shared card number
US20140358777A1 (en)*2013-05-312014-12-04How Kiap GuehMethod for secure atm transactions using a portable device
US20150348044A1 (en)*2014-05-302015-12-03Verizon Patent And Licensing Inc.Secure credit card transactions based on a mobile device

Non-Patent Citations (15)

* Cited by examiner, † Cited by third party
Title
Buchholtz et al., "Multi-Point Authentication for Payment Transactions", U.S. Appl. No. 14/662,315, filed Mar. 19, 2015.
Buchholtz et al., "Multi-Point Authentication for Payment Transactions", U.S. Appl. No. 14/662,329, filed Mar. 19, 2015.
Buchholtz et al., "Multi-Point Authentication for Payment Transactions", U.S. Appl. No. 14/669,596, filed Mar. 26, 2015.
Buchholtz et al., "Multi-Point Authentication for Payment Transactions", U.S. Appl. No. 14/669,626, filed Mar. 26, 2015.
Buchholtz et al., "Multi-Point Authentication for Payment Transactions", U.S. Appl. No. 14/669,659, filed Mar. 26, 2015.
International Search Report and Written Opinion dated Jun. 20, 2016 for PCT/CN2016/076594, 11 pages.
Internet Society et al., "Authentication Mechanisms for ONC RPC (RFC2695)", An IP.com Prior Art Database Technical Disclosure, IP.com No. IPCOM000003288D, original publication: Sep. 1, 1999, electronic publication: Sep. 13, 2000, Copyright (C) The Internet Society (1999). http://ip.com/IPCOM/000003288.
Internet Society et al., "Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG)(RFC3645)", An IP.com Prior Art Database Technical Disclosure, IP.com No. IPCOM000019904D, original publication: Oct. 1, 2003, electronic publication: Oct. 9, 2003, Copyright (C) The Internet Society (2003). http://ip.com/IPCOM/000019904.
Internet Society et al., "Secret Key Transaction Authentication for DNS (TSIG)(RFC2845)", An IP.com Prior Art Database Technical Disclosure, IP.com No. IPCOM000003443D, original publication: May 1, 2000, electronic publication: Sep. 13, 2000, Copyright (C) The Internet Society (2000). http://ip.com/IPCOM/000003443.
List of IBM Patents or Patent Applications Treated as Related, Signed Mar. 24, 2015, 2 pages.
Stokes, N., "The Good, the Bad & the Ugly of Mobile Payments", Techlicious, Sep. 24, 2014. http://www.techlicious.com/tip/what-you-need-to-know-about-paying-with-your-smartphone/.
Unknown, "3-D Secure", Wikipedia, The Free Encyclopedia, printed: Mar. 17, 2015, pp. 1-5. http://en.wikipedia.org/wiki/3-D—Secure.
Unknown, "Google 2-Step Verification", printed: Mar. 16, 2015, pp. 1-4. http://www.google.com/landing/2step/.
Unknown, "Transaction Detail", Authorize.Net, LLC, printed: Mar. 17, 2015, pp. 1-3. https://www.authorize.net/support/CP/helpfiles/Search/Transaction—Detail/Transaction—Detail—Page.htm.
Unknown, "Transaction Details", PayPalObjects.com, printed: Mar. 17, 2015, pp. 1-2. https://www.paypalobjects.com/en—US/vhelp/paypalmanager—help/transaction—details.htm.

Also Published As

Publication numberPublication date
US11017370B2 (en)2021-05-25
US20190197507A1 (en)2019-06-27
US20180121901A1 (en)2018-05-03
US20160275508A1 (en)2016-09-22
US11017371B2 (en)2021-05-25
US20160275500A1 (en)2016-09-22
US10055723B2 (en)2018-08-21

Similar Documents

PublicationPublication DateTitle
US11017371B2 (en)Multi-point authentication for payment transactions
CN105940422B (en) Tokenize authorization
US10977657B2 (en)Token processing utilizing multiple authorizations
CN106464492B (en) network token system
US9947010B2 (en)Methods and systems for payments assurance
US20160275492A1 (en)Confirming physical possession of plastic nfc cards with a mobile digital wallet application
US20160125396A1 (en)Confirming physical possession of plastic nfc cards with a mobile digital wallet application
US20140101055A1 (en)Systems, methods, and computer program products for managing remote transactions
US20210241266A1 (en)Enhancing 3d secure user authentication for online transactions
US12217250B2 (en)Secure contactless credential exchange
CN112514346A (en)Real-time interactive processing system and method
US10796311B2 (en)Authentication using transaction history
US9959538B2 (en)Multi-point authentication for payment transactions
US10055737B2 (en)Multi-point authentication for payment transactions
US10924477B2 (en)System and methods for client identification and verification
US20180114201A1 (en)Universal payment and transaction system
WO2016146071A1 (en)Multi-point authentication for payment transactions
US20150286996A1 (en)Method and apparatus for carrying out an electronic transaction
US11250410B2 (en)Computer implemented method and a payment terminal for executing card present transaction dynamically from remote environment
AABYE et al.SYSTEM AND METHOD FOR AUTHENTICATION USING MOBILE DEVICE
WO2022015584A1 (en)Post payment processing tokenization in merchant payment processing

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUCHHOLTZ, TIMOTHY C.;DAVIS, MORGAN D.;RAMIREZ, DANIEL;AND OTHERS;SIGNING DATES FROM 20150312 TO 20150316;REEL/FRAME:035199/0973

STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:AIRBNB, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:056427/0193

Effective date:20210106

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp